Implementation SHA512 Hash Function And Boyer-Moore String Matching Algorithm For Jpeg/exif Message Digest Compilation

Rachmad Fitriyanto, A. Yudhana, S. Sunardi
{"title":"Implementation SHA512 Hash Function And Boyer-Moore String Matching Algorithm For Jpeg/exif Message Digest Compilation","authors":"Rachmad Fitriyanto, A. Yudhana, S. Sunardi","doi":"10.15575/JOIN.V4I1.304","DOIUrl":null,"url":null,"abstract":"Security information method for JPEG/exif documents generally aims to prevent security attacks by protecting documents with password and watermark. Both methods cannot be used to determine the condition of data integrity at the detection stage of the information security cycle. Message Digest is the essence of a file that has a function as a digital fingerprint to represent data integrity. This study aims to compile digital fingerprints to detect changes that occurred in JPEG / exif documents in information security. The research phase consists of five stages. The first stage, identification of the JPEG / exif document structure conducted using the Boyer-Moore string matching algorithm to find JPEG/exif segments location. The Second stage is segment content acquisition, conducted based on segment location and length obtained. The Third step, computing message digest for each segment using SHA512 hash function. Fourth stage, JPEG / exif document modification experiments to identified affected segments. The fifth stage is selecting and combining the hash value of the segment into the message digest. The obtained result shows the message digest for JPEG/exif documents composed of three hash values. The SOI segment hash value used to detect modifications for JPEG to png conversion and image editing. The APP1 hash value used to detect metadata editing. The SOF0 hash values use to detect modification for image recoloring, cropping and resizing — the combination from three hash values as JPEG/exif’s message digest.","PeriodicalId":32019,"journal":{"name":"JOIN Jurnal Online Informatika","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2019-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"JOIN Jurnal Online Informatika","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.15575/JOIN.V4I1.304","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Security information method for JPEG/exif documents generally aims to prevent security attacks by protecting documents with password and watermark. Both methods cannot be used to determine the condition of data integrity at the detection stage of the information security cycle. Message Digest is the essence of a file that has a function as a digital fingerprint to represent data integrity. This study aims to compile digital fingerprints to detect changes that occurred in JPEG / exif documents in information security. The research phase consists of five stages. The first stage, identification of the JPEG / exif document structure conducted using the Boyer-Moore string matching algorithm to find JPEG/exif segments location. The Second stage is segment content acquisition, conducted based on segment location and length obtained. The Third step, computing message digest for each segment using SHA512 hash function. Fourth stage, JPEG / exif document modification experiments to identified affected segments. The fifth stage is selecting and combining the hash value of the segment into the message digest. The obtained result shows the message digest for JPEG/exif documents composed of three hash values. The SOI segment hash value used to detect modifications for JPEG to png conversion and image editing. The APP1 hash value used to detect metadata editing. The SOF0 hash values use to detect modification for image recoloring, cropping and resizing — the combination from three hash values as JPEG/exif’s message digest.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Jpeg/exif消息摘要编译中SHA512哈希函数和Boyer-Moore字符串匹配算法的实现
JPEG/exif文档的安全信息方法一般是通过使用密码和水印对文档进行保护来防止安全攻击。在信息安全周期的检测阶段,这两种方法都不能用于确定数据完整性的状况。消息摘要是文件的本质,它具有代表数据完整性的数字指纹的功能。本研究旨在编制数位指纹,以侦测资讯安全中JPEG / exif文件所发生的变化。研究阶段分为五个阶段。第一阶段,使用Boyer-Moore字符串匹配算法对JPEG/exif文档结构进行识别,找到JPEG/exif段的位置。第二阶段是片段内容获取,根据获得的片段位置和长度进行。第三步,使用SHA512哈希函数计算每个段的消息摘要。第四阶段,进行JPEG / exif文档修改实验,识别受影响的片段。第五阶段是选择段的哈希值并将其组合到消息摘要中。得到的结果显示了由三个散列值组成的JPEG/exif文档的消息摘要。用于检测JPEG到png转换和图像编辑的修改的SOI段哈希值。用于检测元数据编辑的APP1哈希值。SOF0哈希值用于检测图像重新着色、裁剪和调整大小的修改——这是三个哈希值的组合,作为JPEG/exif的消息摘要。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
2
审稿时长
12 weeks
期刊最新文献
Malware Image Classification Using Deep Learning InceptionResNet-V2 and VGG-16 Method Texture Analysis of Citrus Leaf Images Using BEMD for Huanglongbing Disease Diagnosis Implementation of Ant Colony Optimization – Artificial Neural Network in Predicting the Activity of Indenopyrazole Derivative as Anti-Cancer Agent The Implementation of Restricted Boltzmann Machine in Choosing a Specialization for Informatics Students Digital Image Processing Using YCbCr Colour Space and Neuro Fuzzy to Identify Pornography
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1